The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Anna Lisa Ferrara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf]
  2. Anna Lisa Ferrara, Barbara Masucci
    An Information-Theoretic Approach to the Access Control Problem. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:342-354 [Conf]
  3. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:202-217 [Conf]
  4. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Unconditionally secure key assignment schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:234-252 [Journal]
  5. Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara
    Modeling A Certified Email Protocol using I/O Automata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:339-359 [Journal]
  6. Francis Y. L. Chin, Alfredo De Santis, Anna Lisa Ferrara, N. L. Ho, S. K. Kim
    A simple algorithm for the constrained sequence problems. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:90, n:4, pp:175-179 [Journal]
  7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Ideal contrast visual cryptography schemes with reversing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:4, pp:199-206 [Journal]
  8. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Cryptographic key assignment schemes for any access control policy. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:92, n:4, pp:199-205 [Journal]
  9. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Enforcing the security of a time-bound hierarchical key assignment scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:12, pp:1684-1694 [Journal]
  10. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Efficient Provably-Secure Hierarchical Key Assignment Schemes. [Citation Graph (0, 0)][DBLP]
    MFCS, 2007, pp:371-382 [Conf]
  11. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    New constructions for provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:133-138 [Conf]

  12. Practical Short Signature Batch Verification. [Citation Graph (, )][DBLP]


  13. Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002